CN108777720A - Document transmission method and Related product - Google Patents
Document transmission method and Related product Download PDFInfo
- Publication number
- CN108777720A CN108777720A CN201810730723.5A CN201810730723A CN108777720A CN 108777720 A CN108777720 A CN 108777720A CN 201810730723 A CN201810730723 A CN 201810730723A CN 108777720 A CN108777720 A CN 108777720A
- Authority
- CN
- China
- Prior art keywords
- file
- source terminal
- data packet
- encryption
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
A kind of document transmission method of disclosure offer and Related product, described method includes following steps:Source terminal obtains user's the first file to be transmitted;Source terminal encrypts first file using Encryption Algorithm to obtain the second file, and second file load is transmitted in the load of data packet.Purpose terminal receives the data packet, extracts the second file in the data packet, and the second file decryption is obtained the first file.Technical solution provided by the present application has the advantages that safe.
Description
Technical field
The present invention relates to computer and software technology fields, and in particular to a kind of document transmission method and Related product.
Background technology
File transmission refers to file being relayed to another terminal from a terminal, for transmission during, according to source end
Path between end and purpose terminal, it is possible that repeatedly forwarding, in current file transmission, generally directly transmitting
Mode, i.e., by plaintext transmission, this transmission mode is low for the confidentiality of file, so the safety of its file transmission is low.
Invention content
An embodiment of the present invention provides a kind of document transmission method and Related products, can add to the file of transmission
It is close, the transmission performance of file is improved in this way.
In a first aspect, the embodiment of the present invention provides a kind of document transmission method, described method includes following steps:
Source terminal obtains user's the first file to be transmitted;
Source terminal encrypts first file using Encryption Algorithm to obtain the second file, which is loaded in data
It is transmitted in the load of packet.
Purpose terminal receives the data packet, extracts the second file in the data packet, and the second file decryption is obtained first
File.
Second aspect provides a kind of document transmission system, the system:Source terminal and purpose terminal;
The source terminal, for obtaining user's the first file to be transmitted;
The source terminal obtains the second file, by second file for encrypting first file using Encryption Algorithm
Load is transmitted in the load of data packet.
The purpose terminal extracts the second file in the data packet, by the second file decryption for receiving the data packet
Obtain the first file.
The third aspect provides a kind of computer readable storage medium, and storage is used for the program of electronic data interchange,
In, described program makes terminal execute the method that first aspect provides.
Implement the embodiment of the present invention, has the advantages that:
As can be seen that when through the embodiment of the present invention unidentified to car plate, such as when facing board, body is determined by face
Part, the time is recorded, then realizes the charging to vehicle according to identity, user is not necessarily in this way and takes paper bill, there is user experience
Spend high advantage.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of structural schematic diagram of terminal.
Fig. 2 is a kind of flow chart of asymmet-ric encryption method provided by the present application.
Fig. 3 is a kind of flow chart of asymmetric decryption method provided by the present application.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Term " first ", " second ", " third " in description and claims of this specification and the attached drawing and "
Four " etc. be for distinguishing different objects, rather than for describing particular order.In addition, term " comprising " and " having " and it
Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process of series of steps or unit, method, be
The step of system, product or equipment are not limited to list or unit, but further include the steps that optionally not listing or list
Member, or further include optionally for the intrinsic other steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, result or the characteristic that describe can wrap in conjunction with the embodiments
Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
In the method that first aspect provides,
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
In the method that first aspect provides,
First file is encrypted to obtain the second file by the source terminal using Encryption Algorithm;
Source IP is executed encryption as the encryption secret key for encrypting first file and obtains the second file by source terminal.
In the method that first aspect provides,
The method further includes:
Source terminal increases verification flag in data packet, which is used to indicate the integrity degree of second file.
In the system that second aspect provides,
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
In the system that second aspect provides,
The source terminal obtains second specifically for source IP is executed encryption as the encryption secret key for encrypting first file
File.
In the system that second aspect provides,
The source terminal, be specifically used for data packet increase verification flag, the verification flag be used to indicate this second
The integrity degree of file.
Refering to fig. 1, Fig. 1 is a kind of mobile terminal structure schematic diagram, as shown in Figure 1, the mobile terminal may include intelligence
Mobile phone (such as Android phone, iOS mobile phones, Windows Phone mobile phones), tablet computer, palm PC, laptop,
Mobile internet device (MID, Mobile Internet Devices) or Wearable etc., above-mentioned mobile terminal are only to lift
Example, and it is non exhaustive, it, for convenience of description, will be above-mentioned mobile whole in following example including but not limited to above-mentioned mobile terminal
End is known as user equipment (User equipment, UE) or terminal.Certainly in practical applications, above-mentioned user equipment is also not necessarily limited to
Above-mentioned realization form, such as can also include:Intelligent vehicle mounted terminal, computer equipment, smartwatch etc..As shown in Fig. 1,
The terminal includes:Processor 101, input unit 102, communications module 103, memory 104 and camera 105.
Input unit 102 can be used for receiving the number or character information of input, and generate with the user setting of terminal with
And the related key signals input of function control.Specifically, input unit 102 may include touching display screen, fingerprint identification device with
And other input equipments.Fingerprint identification device can be separately provided, and certainly in practical applications, fingerprint identification device can also be tied
It is bonded to touching display screen, that is, realizes the lower fingerprint of screen.Input unit can also include other input equipments.Specifically, other are inputted
Equipment can include but is not limited to physical button, function key (such as volume control button, switch key etc.), trace ball, mouse,
It is one or more in operating lever etc..
Processor 101 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 104, and call and be stored in memory 104
Data execute the various functions and processing data of terminal, to carry out integral monitoring or control to terminal.Optionally, processor
101 may include one or more processing units;Optionally, processor 101 can integrate application processor, modem processor and
Artificial intelligence chip, wherein the main processing operation system of application processor, user interface and application program etc., modulatedemodulate is mediated
Reason device mainly handles wireless communication, and artificial intelligence chip mainly realizes the calculating of neural network model.It is understood that above-mentioned
Modem processor or artificial intelligence chip can not also be integrated into processor 101.
In addition, memory 104 may include high-speed random access memory, can also include nonvolatile memory, example
Such as at least one disk memory, flush memory device or other volatile solid-state parts.
Communications module 103 can be used for sending and receiving for information.In general, communications module 103 includes but not limited to antenna, extremely
Few an amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..
In addition, communications module 103 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication, which can use, appoints
One communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile
Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more
Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division
Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service
(Short Messaging Service, SMS) etc..
Camera 105 can be used for acquiring picture, scan the two-dimensional code etc. to image real time transfer.Camera 105 has
Body may include front camera or rear camera, can also include dual camera for rear camera, certainly for preceding
It may be dual camera setting to set camera, and the application does not limit the quantity and specific location of camera, camera
The picture of 105 acquisitions can be transferred to processor 101 and carry out relevant processing.
Terminal may also include at least one sensor, such as optical sensor, motion sensor and other sensors.Specifically
Ground, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to the bright of ambient light
Secretly adjust the brightness of touching display screen, proximity sensor can close touching display screen and/or the back of the body when mobile phone is moved in one's ear
Light.As a kind of motion sensor, accelerometer sensor can detect in all directions the size of (generally three axis) acceleration,
Size and the direction that can detect that gravity when static can be used to identify application (such as horizontal/vertical screen switching, the related trip of mobile phone posture
Play, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;The gyro that can also configure as terminal
The other sensors such as instrument, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
WiFi belongs to short range wireless transmission technology, terminal can help user to send and receive e-mail by WiFi module,
Browse webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.
Terminal further includes the power supply (such as battery) powered to all parts, and optionally, power supply can pass through power management
System and processor 101 are logically contiguous, to realize management charging, electric discharge and power managed etc. by power-supply management system
Function.
Referring to Fig.2, Fig. 2 provides a kind of document transmission method, this method can be executed with terminal, this method such as Fig. 2 institutes
Show, includes the following steps:
Step S201, source terminal obtains user's the first file to be transmitted;
Step S202, source terminal encrypts first file using Encryption Algorithm to obtain the second file, by second file
Load is transmitted in the load of data packet.
Step S203, purpose terminal receives the data packet, extracts the second file in the data packet, by the second file decryption
Obtain the first file.
Technical solution provided by the present application carries encrypted file in data packet by after first file encryption
Transmission in load belongs to clear data in this way for data packet, and such data will not be decrypted in forwarding, so i.e.
Make for the second file corruption, then the second file will not divulge a secret, so its have the advantages that it is safe.
Optionally, above-mentioned Encryption Algorithm can specifically include:Rivest, shamir, adelman, symmetric encipherment algorithm etc., certainly
Other Encryption Algorithm can also be used.
Optionally, which is encrypted to obtain the second file and be specifically as follows by above-mentioned source terminal using Encryption Algorithm;
Source IP is executed encryption as the encryption secret key for encrypting first file and obtains the second file by source terminal.
Optionally, the above method can also include:
Source terminal increases verification flag in data packet, which is used to indicate the integrity degree of second file.
Refering to Fig. 3, Fig. 3 provides a kind of document transmission system, the system:Source terminal 301 and purpose terminal 302;
The source terminal, for obtaining user's the first file to be transmitted;
The source terminal obtains the second file, by second file for encrypting first file using Encryption Algorithm
Load is transmitted in the load of data packet.
The purpose terminal extracts the second file in the data packet, by the second file decryption for receiving the data packet
Obtain the first file.
The embodiment of the present invention also provides a kind of computer storage media, wherein computer storage media storage is for electricity
The computer program that subdata exchanges, it is any as described in above method embodiment which so that computer is executed
A kind of some or all of document transmission method step.
The embodiment of the present invention also provides a kind of computer program product, and the computer program product includes storing calculating
The non-transient computer readable storage medium of machine program, the computer program are operable to that computer is made to execute such as above-mentioned side
Some or all of any type document transmission method described in method embodiment step.
It should be noted that for each method embodiment above-mentioned, for simple description, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence because
According to the present invention, certain steps can be performed in other orders or simultaneously.Secondly, those skilled in the art should also know
It knows, embodiment described in this description belongs to alternative embodiment, and involved action and module are not necessarily of the invention
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, for example, the unit division, it is only a kind of
Division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit,
Can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of software program module.
If the integrated unit is realized in the form of software program module and sells or use as independent product
When, it can be stored in a computer-readable access to memory.Based on this understanding, technical scheme of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory
Various Jie that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD
Matter.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer-readable memory, memory
May include:Flash disk, read-only memory (English:Read-Only Memory, referred to as:ROM), random access device (English:
Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present invention is described in detail above, specific case used herein to the principle of the present invention and
Embodiment is expounded, and the explanation of above example is only intended to facilitate the understanding of the method and its core concept of the invention;
Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, can in specific embodiments and applications
There is change place, in conclusion the content of the present specification should not be construed as limiting the invention.
Claims (9)
1. a kind of document transmission method, which is characterized in that described method includes following steps:
Source terminal obtains user's the first file to be transmitted;
Source terminal encrypts first file using Encryption Algorithm to obtain the second file, which is loaded in data packet
It is transmitted in load.
Purpose terminal receives the data packet, extracts the second file in the data packet, and the second file decryption is obtained the first file.
2. according to the method described in claim 1, it is characterized in that,
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
3. according to the method described in claim 1, it is characterized in that, the source terminal adds first file using Encryption Algorithm
Close second file that obtains is specially;
Source IP is executed encryption as the encryption secret key for encrypting first file and obtains the second file by source terminal.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
Source terminal increases verification flag in data packet, which is used to indicate the integrity degree of second file.
5. a kind of document transmission system, which is characterized in that the system:Source terminal and purpose terminal;
The source terminal, for obtaining user's the first file to be transmitted;
The source terminal obtains the second file for encrypting first file using Encryption Algorithm, which is loaded
It is transmitted in the load of data packet.
The purpose terminal extracts the second file in the data packet, the second file decryption is obtained for receiving the data packet
First file.
6. system according to claim 5, which is characterized in that
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
7. system according to claim 5, which is characterized in that
The source terminal obtains the second text specifically for source IP is executed encryption as the encryption secret key for encrypting first file
Part.
8. system according to claim 5, which is characterized in that
The source terminal is specifically used for increasing verification flag in data packet, which is used to indicate second file
Integrity degree.
9. a kind of computer readable storage medium, program of the storage for electronic data interchange, wherein described program makes end
End executes the method provided such as claim 1-4 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810730723.5A CN108777720A (en) | 2018-07-05 | 2018-07-05 | Document transmission method and Related product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810730723.5A CN108777720A (en) | 2018-07-05 | 2018-07-05 | Document transmission method and Related product |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108777720A true CN108777720A (en) | 2018-11-09 |
Family
ID=64031062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810730723.5A Pending CN108777720A (en) | 2018-07-05 | 2018-07-05 | Document transmission method and Related product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108777720A (en) |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1481127A (en) * | 2002-09-04 | 2004-03-10 | 英华达(上海)电子有限公司 | Method for filtering packets in wireless network system |
CN101222509A (en) * | 2008-01-22 | 2008-07-16 | 中兴通讯股份有限公司 | Data protection transmission method of P2P network |
CN101325582A (en) * | 2007-06-15 | 2008-12-17 | 华为技术有限公司 | Method, system and apparatus for protecting proxy mobile internet protocol signalling |
CN101577736A (en) * | 2009-06-04 | 2009-11-11 | 中兴通讯股份有限公司 | Method and device for uploading files |
CN101984406A (en) * | 2010-11-01 | 2011-03-09 | 中兴通讯股份有限公司 | Method and system for upgrading terminal through wireless local area network |
CN102571790A (en) * | 2011-12-31 | 2012-07-11 | 上海聚力传媒技术有限公司 | Method and device for implementing encrypted transmission of target files |
CN102882789A (en) * | 2012-09-17 | 2013-01-16 | 华为技术有限公司 | Data message processing method, system and equipment |
CN103166958A (en) * | 2013-02-26 | 2013-06-19 | 深圳创维数字技术股份有限公司 | Protection method and protection system of file |
US8892875B1 (en) * | 2011-07-29 | 2014-11-18 | Trend Micro Incorporated | Methods and apparatus for controlling access to encrypted computer files |
CN105450632A (en) * | 2015-11-03 | 2016-03-30 | 中国石油天然气集团公司 | Adaptive secure communication interface method |
CN105959281A (en) * | 2016-04-29 | 2016-09-21 | 腾讯科技(深圳)有限公司 | File encrypted transmission method and device |
US20160365981A1 (en) * | 2015-06-10 | 2016-12-15 | Arris Enterprises Llc | Code signing system with machine to machine interaction |
CN106709360A (en) * | 2015-11-17 | 2017-05-24 | 福州瑞芯微电子股份有限公司 | Data transmission and storage method and system |
CN106789975A (en) * | 2016-12-07 | 2017-05-31 | 广东京奥信息科技有限公司 | A kind of method of the text encryption transmission with byte stream is preserved |
CN106982186A (en) * | 2016-01-16 | 2017-07-25 | 周念东 | A kind of online safe key guard method and system |
CN107483196A (en) * | 2017-09-08 | 2017-12-15 | 中南大学 | Data stream encryption system and its implementation based on continuous variable quantum key distribution |
-
2018
- 2018-07-05 CN CN201810730723.5A patent/CN108777720A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1481127A (en) * | 2002-09-04 | 2004-03-10 | 英华达(上海)电子有限公司 | Method for filtering packets in wireless network system |
CN101325582A (en) * | 2007-06-15 | 2008-12-17 | 华为技术有限公司 | Method, system and apparatus for protecting proxy mobile internet protocol signalling |
CN101222509A (en) * | 2008-01-22 | 2008-07-16 | 中兴通讯股份有限公司 | Data protection transmission method of P2P network |
CN101577736A (en) * | 2009-06-04 | 2009-11-11 | 中兴通讯股份有限公司 | Method and device for uploading files |
CN101984406A (en) * | 2010-11-01 | 2011-03-09 | 中兴通讯股份有限公司 | Method and system for upgrading terminal through wireless local area network |
US8892875B1 (en) * | 2011-07-29 | 2014-11-18 | Trend Micro Incorporated | Methods and apparatus for controlling access to encrypted computer files |
CN102571790A (en) * | 2011-12-31 | 2012-07-11 | 上海聚力传媒技术有限公司 | Method and device for implementing encrypted transmission of target files |
CN102882789A (en) * | 2012-09-17 | 2013-01-16 | 华为技术有限公司 | Data message processing method, system and equipment |
CN103166958A (en) * | 2013-02-26 | 2013-06-19 | 深圳创维数字技术股份有限公司 | Protection method and protection system of file |
US20160365981A1 (en) * | 2015-06-10 | 2016-12-15 | Arris Enterprises Llc | Code signing system with machine to machine interaction |
CN105450632A (en) * | 2015-11-03 | 2016-03-30 | 中国石油天然气集团公司 | Adaptive secure communication interface method |
CN106709360A (en) * | 2015-11-17 | 2017-05-24 | 福州瑞芯微电子股份有限公司 | Data transmission and storage method and system |
CN106982186A (en) * | 2016-01-16 | 2017-07-25 | 周念东 | A kind of online safe key guard method and system |
CN105959281A (en) * | 2016-04-29 | 2016-09-21 | 腾讯科技(深圳)有限公司 | File encrypted transmission method and device |
CN106789975A (en) * | 2016-12-07 | 2017-05-31 | 广东京奥信息科技有限公司 | A kind of method of the text encryption transmission with byte stream is preserved |
CN107483196A (en) * | 2017-09-08 | 2017-12-15 | 中南大学 | Data stream encryption system and its implementation based on continuous variable quantum key distribution |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104821937B (en) | Token acquisition methods, apparatus and system | |
US11379022B2 (en) | Mobile terminal | |
CN107113162B (en) | The system and method for multivalue packing scheme for homomorphic cryptography | |
CN104598263B (en) | Application program operation method, configuration file generation method and device | |
CN104700010A (en) | Personal information protection method and protection device | |
CN106331372B (en) | Data transmission method and mobile terminal | |
CN107103211B (en) | SDK send, using publication, using operation method and device | |
CN106502826B (en) | Data backup and transmission method and mobile terminal | |
CN106850220A (en) | Data ciphering method, data decryption method and device | |
CN105678553A (en) | Method, device and system for processing order information | |
CN110169028A (en) | Update method, terminal and the server of network insertion weight discriminating information | |
CN104700003B (en) | A kind of file shell adding and hulling method, apparatus and system | |
CN104579668A (en) | User identity verification method, password protection device and verification system | |
CN107154935A (en) | service request method and device | |
CN106599698B (en) | A kind of method and apparatus for encrypting picture, decrypting picture | |
CN108307529A (en) | A kind of hotspot connection method and its mobile terminal | |
CN107911818A (en) | The method, device and mobile terminal of data transfer between mobile terminal | |
CN104954126A (en) | Sensitive operation verification method, device and system | |
CN104901991A (en) | Methods, devices and system for transferring virtual resource | |
CN106685948A (en) | Data processing method, terminal, communication device and data processing system | |
CN107592409A (en) | Application control method and device | |
CN109918880A (en) | The method, apparatus and terminal device of data encryption or decryption | |
CN104639394B (en) | Statistical method, the device and system of client number of users | |
CN107995151A (en) | Login validation method, apparatus and system | |
CN106954211B (en) | A kind of key wiring method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181109 |